Military theory is a primary component. Expanding Combat Power Through Military Cyber Power Theory. By Sean Charles Gaines Kern

Size: px
Start display at page:

Download "Military theory is a primary component. Expanding Combat Power Through Military Cyber Power Theory. By Sean Charles Gaines Kern"

Transcription

1 General Dempsey hosts question-and-answer session with Peter W. Singer, director of Center for 21 st Century Security and Intelligence, in Washington, DC, June 2013 (DOD/Daniel Hinton) Expanding Combat Power Through Military Cyber Power Theory By Sean Charles Gaines Kern We need a theory for cyberspace operations that will allow us to understand the implications of employing cyberspace capabilities at the tactical, operational, and strategic levels. 1 Major General Brett T. Williams, USAF Lieutenant Colonel Sean Charles Gaines Kern, USAF, is assigned to U.S. Cyber Command. Military theory is a primary component of operational art. Early military theorists such as Alfred Thayer Mahan, Giulio Douhet, and B.H. Liddell Hart reasoned about the maritime, air, and land domains respectively, generating frameworks, models, and principles for warfare. Today, these theories help strategists and planners think about, plan for, and generate joint combat power. Unfortunately, no standard military theory for cyberspace operations exists, although elements for such a theory do. If a codified theory for military cyber power existed, it would greatly aid the joint force com- 88 Features / Expanding Combat Power JFQ 79, 4 th Quarter 2015

2 mander (JFC) in integrating cyberspace operations with joint operations, resulting in expanded combat power. Although JFCs have many years of practical experience and military education in employing joint forces, they are not as experienced with cyberspace operations. 2 There is a lack of shared cyberspace knowledge and an agreed operational approach to link cyberspace missions and actions and place them in the larger context of joint operations. 3 Military cyber power theory is the foundation for such knowledge. The JFC requires a cyberspace component commander who, through education and experience, has developed the requisite expertise to apply military cyber power theory at a level equivalent to his or her peers in the other domains. However, joint doctrine does not describe such a leadership role. Without the equivalent of a joint force cyberspace component commander (JFCCC), it is unlikely that the JFC would be able to effectively integrate cyberspace operations within the construct of joint operations. This results in a perpetual adjunct role for cyberspace operations and suboptimal combat power, as the Chairman of the Joint Chiefs of Staff himself noted as a key operational problem in the Capstone Concept for Joint Operations: Joint Force Toward a Preliminary Theory The most challenging aspect of developing cyber operational art is devising a military theory for cyber power, which is essential for assessing the operational environment and making predictive judgments that will then guide strategy and plan development. By viewing the operational environment through the lens of military cyber power theory, the JFCCC will be in the position to provide his or her best military advice to the JFC, resulting in integrated cyberspace operation and expanded combat power. A framework advances understanding and provides a basis for reasoning about the current and potential future environment by incorporating a number of elements. The framework identifies and defines key terms and structures discussion by categorizing the elements of the theory. It explains the categorized elements by summarizing relevant events and introducing additional frameworks and models. It allows the members of the cyber community to connect diverse elements of the body of knowledge to comprehensively address key issues. Finally, the predictive nature of the framework will enable the practitioner to anticipate key trends and activities to test the validity of the theory. 5 Although Major General Brett Williams called for a theory of cyberspace operations that addresses cyberspace operations at the strategic, operational, and tactical levels, the focus here is at the strategic and operational levels since the JFCCC s responsibility will be to translate strategic direction into operational plans. Early cyber power theorists generally identified and defined three key terms: cyberspace, cyber power, and cyber strategy. Under the guise of military cyber power theory, this author offers four additional terms: military cyber power, military cyber strategy, key cyber terrain, and military cyberspaces. Military cyber power is defined as the application of operational concepts, strategies, and functions that employ cyberspace operations (offensive cyberspace operations [OCO], defensive cyberspace operations [DCO], and Department of Defense [DOD] information network [DODIN] operations) in joint operations to expand combat power for the accomplishment of military objectives and missions. 6 Military cyber strategy is defined as the development and employment of operational cyberspace capabilities integrated with other operational domain capabilities to expand combat power and accomplish the military objectives and missions of the JFC. These definitions reflect an emphasis on cyberspace operations mission areas and their contributions to joint operations and joint force combat power. Given the pervasive and ubiquitous nature of the cyberspace domain and the fact that the military relies heavily on the commercial sector for interconnectivity, the concept of key terrain becomes especially critical in the context of military cyber power theory. Key cyber terrain forms the foundation from which the joint force preserves and projects military cyber power and represents the attack surface that adversaries would likely target. It is defined as any physical, logical, or persona element of the cyber space domain, including commercial services, the disruption, degradation, or destruction of which constricts combat power, affording a marked advantage to either combatant. Defining cyberspace as a global domain suggests a homogeneity that does not exist in reality. There is not one cyberspace, but many cyberspaces. 7 These cyberspaces are in most cases interconnected by privately owned infrastructure. DOD has over 15,000 networks, or cyberspaces, interconnected by commercial infrastructure that the department does not own or control. This has two significant implications. First, unlike in other domains, the joint force is not solely capable of generating its required military cyber power; it relies on commercial services. Second, not all key cyber terrain will be under control of the joint force. For example, there is no current equivalent in cyberspace to the way in which the United States fully militarized its airspace immediately following the 9/11 terrorist attacks. Thus, military cyberspaces are defined as networks or enclaves wholly owned and operated by DOD, interconnected by means that are outside the control or direct influence of DOD. With key terms identified and defined, military cyber power theory must conceptually consider the relationships of these terms as well as other relevant domain characteristics. The JFCCC must consider his or her efforts in the context of the three layers of cyberspace: physical, logical, and persona layers. 8 Figure 1 depicts the relationships between the terms (left) and the relation of the cyberspace layers in the context of the overall friendly or adversary attack surface (right). Based on these relationships, the JFCCC can then conceptualize the weighted effort of the cyberspace operations mission areas. These operations comprise the ways and means for the JFCCC s cyber strategy and planning. JFQ 79, 4 th Quarter 2015 Kern 89

3 Figure 1. Elements of Military Cyber Power Theory and Cyberspace Domain Layers Key Cyber Terrain Cyberspace(s) Figure 2. Weighted Effort for Cyberspace Operations Cyber Planning OCO, DCO-RA DCO-IDM DODIN Operations Foreign Spectrum Commercial Service Figure 3. Cyber Adversary Characterization Cyber Persona Logical Network Physical Network Attack Surface Figure 4. Cyber Kill Chain Low Persistence Cyber Strategy Cyberpower Non-DOD Cyberspace High Persistence Automated Manual Opportunistic Targeted Simple Advanced Complex Institutional Factors Attack Surface Key Cyber Terrain The weighted effort, in priority order, would be DODIN operations, DCO Internal Defense Measures (DCO-IDM), DCO Response Actions (DCO-RA), and OCO (see figure 2). The joint force conducts cyberspace operations, like all joint operations, with the adversary in mind. This leads to a final structured discussion to characterize cyberspace adversaries and conceptualize adversarial operational planning and execution. Ultimately, this discussion gives the JFCCC the framework to assess risks associated with generating combat power. The JFCCC and staff assess cyberspace adversaries similar to adversaries in other domains in terms of intent and capability. It takes two types of capabilities in the cyberspace domain to conduct cyberspace operations: technical and analytical. Analytical capability refers to the ability to analyze a potential target to identify its critical nodes and vulnerabilities and potentially its connections to other targets. Technical capability refers to knowledge of computer software and hardware, networks, and other relevant technologies. 9 The JFCCC can further categorize cyber adversaries as simple, advanced, and complex, based in part on the scope and scale of operations and potential effects achieved. In addition to being simple, advanced, or complex, military cyber power theory categorizes adversary operations as either opportunistic or targeted. The former is usually cybercrime-related, automated, and rarely attempts to maintain persistent presence. Targeted attacks are oriented against friendly key cyber terrain and are likely to be persistent and stealthy. In targeted attacks, cyber operators may be manually interacting with target systems. These categories are not mutually exclusive, as opportunistic attackers may gain access to high-value systems and in turn seek to sell access to these systems to adversaries seeking targeted access (for example, the nexus of cybercrime and state-sponsored cyber operations). Figure 3 shows the relationships among adversary capability, targeting type, and level of persistence. Cyberspace adversaries share common strategic and operational concepts with adversaries in other domains, one of which is the concept of a kill chain. Conceptualizing a cyber kill chain enables the JFCCC to understand how the adversary plans and conducts cyber operations. The cyber kill chain depicted in figure 4 provides an excellent framework for the JFCCC to develop the appropriate strategy and corresponding operational plans to mitigate the adversarial threat. The ultimate goal is to detect and defend against the adversary as early as possible in the chain, ideally at or prior to the adversary developing access. Military Cyber Power Principles A theory of military cyber power includes principles that would inform the JFCCC s operational art. The true test of a theory is how well these principles hold over time. The principles examined here are not exhaustive and should serve as a foundation for future expansion of military cyber power theory. Stealth and Utility. A cyberspace capability is effective as long as it can go undetected and exploit an open vulnerability. If the adversary detects the cyber capability or mitigates the targeted vulnerability, the cyber capability is perishable. These characteristics may drive the timing of cyber operations based on the perceived utility. 10 Convergence, Consolidation, and Standardization. In peacetime, efficiency is valued over effectiveness. Core services are converging to Internet Protocol technologies. Smaller bandwidth network interconnections are converging to fewer massive bandwidth interconnections. DOD is consolidating data centers and Internet access points, resulting in streamlined, consolidated service architectures. DOD is also standardizing hardware and software. Convergence, consolidation, and standardization create an efficient, homogenous military cyberspace environment that reduces the DOD attack surface overall and better postures cyber defenders to preserve combat power. However, these efforts reduce system redundancy, limit alternative routes, and increase the number of chokepoints, making it easier for an 90 Features / Expanding Combat Power JFQ 79, 4 th Quarter 2015

4 Joint Service and civilian personnel concentrate on exercise scenarios during Cyber Guard 2015 (DOD/Marvin Lynchard) adversary to identify and target friendly key cyber terrain. Complexity, Penetration, and Exposure. Systems are becoming increasingly complex by almost every measure. Higher complexity begets a growth in vulnerabilities. Internet penetration is expanding in terms of people and devices connected to cyberspace. People and organizations are integrating an increasing number of services delivered through cyberspace into their daily lives and operations, creating significant cyberspace exposure. Complexity, penetration, and exposure increase the attack surface by creating broader and deeper technical and process vulnerabilities, putting joint combat power at risk. Primacy of Defense. History shows that militaries are prone to favor offensive operations. 11 Yet Colin Gray, Brett Williams, and Martin Libicki argue that DCO, not OCO, should be the JFC s primary effort in cyberspace. Since the joint force constructs cyberspace, Gray contends that cyberspace operators can repair the damage. Each repair hardens the system against future attacks. Offense can achieve surprise, but response and repair should be routine. Cyberspace defense is difficult, but so is cyberspace offense. 12 As systems are hardened, an attacker must exploit multiple vulnerabilities to achieve the same effect as compared to prior attacks that only required a single exploit. 13 Speed and Global Reach. Cyberspace exhibits levels of speed and reach uncharacteristic of the other domains. Like other domains, cyberspace operations, especially offensive ones, require significant capability development, planning, reconnaissance, policy, and legal support prior to execution. However, once the JFC decides to act, cyberspace effects can be nearly instantaneous. The global cyberspace domain relegates geography to a subordinate consideration. Arranging Operations. The Joint Operational Access Concept states that the critical support provided by cyberspace operations generally must commence well in advance of other operations as part of efforts to shape the operational area. Even in the absence of open conflict, operations to gain and maintain cyberspace superiority will be a continuous requirement since freedom of action in cyberspace is critical to all joint operations. 14 Chris Demchak offers a cautionary consideration, suggesting that if kinetic operations eventually take place, the United States may see the results of several decades of cyber preparation of the battlefield, ranging from tainted supply chains to embedded malware. 15 Resilience. Resilience is the ability to continue operations in a degraded cyber environment while mitigating quickly the impact of any attack. Much like the Quick Reaction Force construct in the physical domain, cyberspace operations require JFQ 79, 4 th Quarter 2015 Kern 91

5 robust DCO-IDM capacity oriented in support of friendly key cyber terrain to respond quickly to mitigate the effects of adversarial cyberspace operations. In concert with these DCO-IDM efforts, the total force will need to implement people, process, and technology measures, such as network minimize procedures or increasing bandwidth capacity, to continue to operate in the degraded environment. Cyber-Physical Interface. To gain efficiencies, critical infrastructure owners and operators have increasingly connected their once-closed systems to the Internet. As a result, industrial control systems and supervisory control and data acquisition systems are increasingly easy to exploit. These systems are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Decision Integrity. Assuring integrity of operational information is essential to maintaining trust and confidence in the quality of decisionmaking, since making decisions based on wrong information could degrade joint combat power. Without a baseline of what is normal, it is impossible to discern if an adversary has made unauthorized changes to operational information. As Charles Barry and Elihu Zimet observe, The possession of accurate and timely knowledge and the unfettered ability to distribute this as information have always been the sine qua non of warfighting. 16 Speed, Not Secrets. Ninety-eight percent of all information is digitized. 17 Adversaries have proved adept at compromising and extracting information from closed networks. In this environment, how long is it reasonable to expect secrecy? The days of having a high degree of confidence that secrets will remain secure are fleeting. Overclassification exacerbates this problem and negatively affects key cyber terrain analysis. The joint force should place value on the ability to make decisions before the adversary compromises key information. Strategic Attribution. From a strategic perspective, it may be more important to know Who is to blame? than Who did it? 18 This shift in perspective changes focus from technical attribution, which is difficult, to one of assigning responsibility to a nation-state more pointedly, to national decisionmakers for either ignoring, abetting, or conducting cyberspace operations against the United States, its allies, and key partners. Increase Security, Decrease Freedom of Movement. In other domains, increased security usually implies greater freedom of movement and action. This same concept is not true for cyberspace since increased cybersecurity usually restricts options in cyberspace. Scope and Scale of Effects. The most sophisticated cyber adversaries have the means to create a regional disturbance for a short period or a local disturbance for a sustained period. 19 The intelligence functions should continually assess the intent and capabilities of potential adversaries to predict the potential scope and scale of effects. Increased Reliance on Commercial Services. U.S. Central Command s March 2014 posture statement noted the command is heavily reliant on host nation communications infrastructure across the Central Region. 20 Whereas a JFC can easily partition and militarize the other domains into internationally and nationally recognized contiguous operational areas, cyberspace largely exists via private sector Internet service providers connecting national and military network enclaves. 21 The JFCCC will have to consider this dynamic when attempting to define his cyber joint operational area. Perpetual, Ambiguous Conflict. Cyberspace is in a perpetual state of conflict that crosses geographic boundaries. Unlike the other domains where one can physically discern unambiguous threat indications and warning, operations in cyberspace are inherently ambiguous. Ambiguity can make war more or less likely. Timothy Junio suggests this is the case because ambiguity may lead states to overestimate their potential gains, overestimate their stealth, and/or underestimate their adversary s skill. 22 Demchak warns that actions by nonstate actors could lead to unintended escalation as one state misinterprets the action or uses it as cover for its own actions. 23 Cyber Intelligence. Cyber intelligence scanning for things that just do not look right by sifting through chatter to discern patterns of intelligence can become close to police work. 24 When DCO operators detect an adversary, it is difficult to assess adversarial intent. Is the adversary conducting reconnaissance, exfiltrating information, or instrumenting the network for a follow-on operation? A JFCCC must be able to assess cyber situational awareness beyond the joint operational area to understand fully the scope and scale of cyber risks to the theater of operations. Centralized Control, Centralized Execution. Because any point in cyberspace is equidistant to any other, cyber forces are capable of deploying and surging virtually without the required mobilization time and physical proximity to theater operations. This characteristic is a contributing factor to the centralized control, centralized execution model employed by U.S. Cyber Command. This model affects the development of cyberspace experience across the joint force. Precedence. There are currently no universally accepted norms of behavior in cyberspace. As such, employment of a cyberspace capability may result in a de facto precedence that other nation-states and nonstate actors may use as a barometer for how they may choose to act in cyberspace. Currently, some senior leaders view offensive cyberspace operations as a last resort, restricting the ability to develop cyberspace experience. Uncertainty. Whereas the physical characteristics of the other domains are well understood and defined, cyberspace is a constantly changing, dynamic domain that is difficult to model due to its ubiquity and complexity. Unlike the precision of kinetic weapons, there is a level of doubt regarding the use of cyber capabilities in terms of understanding what effects cyber forces can achieve in cyberspace and assessing the success of cyberspace operations. This uncertainty is compounded by a lack of cyber experience and education in the senior ranks, thus creating a circle of uncertainty, reluctance to employ, and lost opportunities 92 Features / Expanding Combat Power JFQ 79, 4 th Quarter 2015

6 Soldiers training with first fully immersive virtual simulation for infantry at 7 th Army Joint Multinational Training Command in Grafenwoehr, Germany, December 2013 (U.S. Army/Markus Rauchenberger) to gain cyber experience, leading to even greater uncertainty. The combination of key terms, frameworks, and principles serves as a foundation for an evolving military cyber power theory, which serves as a building block to enhance both the explanatory and predictive power of the JFCCC s recommendations to the JFC. Application of the theory improves the soundness and timeliness of these recommendations. With expert understanding and application of this preliminary military cyber power theory, the JFCCC will be better prepared to provide the JFC recommendations to integrate cyberspace operations in joint operations to preserve and project joint combat power. Cyberspace Operations as Combat Power Practitioners validate military theory through application. A successful military theory expertly applied should result in increased combat power for the practitioner. Given the lack of cyberspace operations experience and education in the joint force, it may be difficult to consider how cyberspace operations could contribute to combat power. It does not help that joint doctrine is silent regarding the direct relationship between cyberspace operations and combat power. Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, defines combat power as the total means of destructive and disruptive force that a military unit or formation can apply against an opponent at a given time. 25 The two key words are destructive and disruptive. Although JP 3-12(R), Cyberspace Operations, does not refer to combat power, it implies it by describing direct denial effects achieved through cyberspace attack, which include, in part, the ability to destroy and disrupt adversary targets. The primary doctrinal source for combat power is JP 3-0, Joint Operations, in which the JFC is the central focus. The JFC seeks decisive advantage using all available elements of combat power to seize and maintain the initiative, deny the enemy the opportunity to achieve its objectives, and generate a sense of inevitable failure and defeat in the enemy. 26 Joint doctrine leaves the reader with a sense that there is a bias to operations and effects in the physical domains. For example, JP 3-0 discusses the relative combat power that military forces can generate in terms of delivering forces and materiel. It describes the roles of long-range air and sea operations as effective force projection when timely or unencumbered access to the area of operations is not available. It also JFQ 79, 4 th Quarter 2015 Kern 93

7 Vice Admiral Jan E. Tighe, commander of Fleet Cyber Command and commander of U.S. 10 th Fleet, right, discusses educational requirements for cyber and course matrices that support those requirements (DOD/Javier Chagoya) discusses combat power in the context of mass, maneuver, economy of force, and surprise. Like JP 3-12(R), JP 3-0 does not reference cyberspace operations in relation to combat power, although it does note that cyberspace superiority may enable freedom of action throughout the operational area. There is clearly an opportunity to link cyberspace operations and combat power in joint doctrine. In addition to doctrinal references to combat power, the Chairman also publishes operational concepts that provide broad visions for how joint forces will operate in response to specific challenges. For example, the Chairman s Joint Operational Access Concept (JOAC) calls for cross-domain synergy to overcome emerging antiaccess/area-denial (A2/ AD) challenges. Cross-domain synergy seeks to employ complementary capabilities in different domains such that each enhances the effectiveness and compensates for the vulnerabilities of others. 27 To this end, the JOAC specifically addresses the need for greater and more flexible integration of cyberspace operations into the traditional land-sea-air battlespace. It identifies two combat power related tasks required to gain and maintain access in the face of armed opposition. The first is overcoming the enemy s A2/AD capabilities through the application of combat power. The second is moving and supporting the necessary combat power over the required distances. Cyberspace operations play a critical role in accomplishing both of these tasks. Fifteen of the 30 capabilities required in the concept are either directly or indirectly associated with the conduct of cyberspace operations, with significant requirements in command and control, intelligence, and fires capabilities. The A2/AD challenge is an excellent operational problem to validate and expand the preliminary military cyber power theory discussed herein. Conclusion Stanley Baldwin asserted in 1932 that the bomber will always get through. History has shown that he was wrong. However, the adoption of this theoretical airpower perspective did drive acquisition, organization, and doctrine leading into World War II. Cyberspace operations share some similarities with the interwar years. Much remains undetermined about the role of cyberspace operations in joint operations and their impact on joint combat power. Yet there are historic examples, key trends, and operational problems that call for increased attention to the need for a military cyber power theory and, consequently, the need for updates to doctrine, organization, and education to inculcate the military cyber power principles presented here. The Joint Staff should update doctrine to reflect the growing importance of effectively integrating cyberspace operations in joint operations to expand joint combat power. It should update JP 3-12(R) to reflect the need for a JFCCC and incorporate aspects of the preliminary military cyber power theory presented here. Likewise, the Joint Staff should update JP 3-0 s description of combat power to broaden and deepen the relationship between cyberspace operations and combat power. Moreover, professional military education and advanced studies programs should include military cyber power theory in the curricula and challenge students to conduct research to evolve the theory. Organizationally, the JFC should designate a JFCCC for most task force operations. However, depending on the forces assigned, it may be difficult for the JFC to identify a JFCCC candidate that has the preponderance of cyber forces and the best means to command and control those cyber forces. Furthermore, organizations that must address A2/ AD in their strategies and operational plans should conduct extensive exercises with a heavy emphasis on cyberspace capabilities. With expert understanding and application of military cyber power theory, the JFCCC is poised to develop strategic and operational recommendations for the JFC to integrate and synchronize cyberspace operations in joint operations and achieve expanded combat power. The need for integrated cyberspace operations and its contribution to joint combat power is clearly illustrated in one of the most significant operational challenges the joint force will likely face in the future, which is gaining and maintaining operational access in the face of enemy A2/AD capabilities. The Joint Operational Access Concept notes three trends in the operating environment that will likely complicate the challenge of opposed access, one of those being the emergence of cyberspace as an increasingly important and 94 Features / Expanding Combat Power JFQ 79, 4 th Quarter 2015

8 contested domain. The implication is that the JFCCC and his staff are becoming ever more central in assisting the JFC in generating combat power to disrupt, degrade, and defeat enemy A2/AD capabilities. If the joint force is going to be successful in future advanced A2/AD operations, the JFC must fully integrate cyberspace operations into joint operations. A prerequisite for success is the designation of a JFCCC with the requisite professional development, to include expert understanding of and experience applying military cyber power theory. JFQ Notes 1 Brett T. Williams, The Joint Force Commander s Guide to Cyberspace Operations, Joint Force Quarterly 73 (2 nd Quarter 2014), Brett T. Williams, Ten Propositions Regarding Cyberspace Operations, Joint Force Quarterly 61 (2 nd Quarter 2011), Williams, The Joint Force Commander s Guide. 4 Capstone Concept for Joint Operations: Joint Force 2020 (Washington, DC: The Joint Staff, September 10, 2012), 7, available at < 5 Stuart H. Starr, Toward a Preliminary Theory of Cyberpower, in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington, DC: National Defense University Press/ Potomac Books, Inc., 2009), Adapted from Elihu Zimet and Charles L. Barry, Military Service Overview, in Cyberpower and National Security, Colin Gray, Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling (Carlisle Barracks, PA: U.S. Army War College, April 2013). 8 Joint Publication (JP) 3-12(R), Cyberspace Operations (Washington, DC: The Joint Staff, February 5, 2013). 9 Irving Lachow, Cyber Terrorism: Menace or Myth? in Cyberpower and National Security, Robert Axelrod and Rumen Iliev, Timing of Cyber Conflict, Proceedings of the National Academy of Science 111, no. 4 (January 28, 2014), available at < content/111/4/1298.abstract>. 11 Timothy J. Junio, How Probable Is Cyber War? Bringing IR Theory Back into the Cyber Conflict Debate, Journal of Strategic Studies 36, no. 1 (February 2013). 12 Gray. 13 Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World s First Digital Weapon (New York: Crown Publishing, 2014). 14 Joint Operational Access Concept (Washington, DC: The Joint Staff, January 17, 2012). 15 Peter Dombrowski and Chris C. Demchak, Cyber War, Cybered Conflict, and the Maritime Domain, Naval War College Review (April 2014), available at < com/201404/ html>. 16 Zimet and Barry. 17 Joel Brenner, America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare (New York: Penguin Press, 2011). 18 Jason Healey, Beyond Attribution: Seeking National Responsibility for Cyber Attacks, Issue Brief (Washington, DC: The Atlantic Council, 2011), available at < public/2012/mar/national_responsibility_for_cyberattacks,_2012.pdf>. 19 Armed Forces Communications and Electronics Association 2013 Spring Intelligence Symposium, available at < events/globalintelforum/13/welcome.asp>. 20 Commander s Posture Statement (Tampa, FL: U.S. Central Command, March 5, 2014), available at < 21 Capstone Concept for Joint Operations. 22 Junio, Chris Demchak and Peter Dombrowski, Cyber Westphalia: Asserting State Prerogatives in Cyberspace, Georgetown Journal of International Affairs (Special Issue 2013). 24 Mark Lowenthal, Intelligence: From Secrets to Policy, 5 th ed. (Washington, DC: Sage Press, 2013). This is adapted from Lowenthal s description of the intelligence challenge posed by terrorism. 25 JP 1-02, Department of Defense Dictionary of Military and Associated Terms (Washington, DC: The Joint Staff, November 15, 2014). 26 JP 3-0, Joint Operations (Washington, DC: The Joint Staff, August 11, 2011). 27 Joint Operational Access Concept, Version 1.0 (Washington, DC: Department of Defense, January 17, 2012), foreword. New from NDU Press for the Center for the Study of Chinese Military Affairs China Strategic Perspectives 9 China Moves Out: Stepping Stones Toward a New Maritime Strategy by Christopher H. Sharman In this paper, Christopher H. Sharman examines the geography, history, and strategic focus of near seas active defense, which is China s current maritime strategy. He then carefully illustrates how the New Historic Missions expanded People s Liberation Army Navy (PLAN) requirements from traditional near seas operating areas to operations in the far seas. He next provides a strategic framework for a new maritime defense strategy that would incorporate far seas capabilities. He finally concludes by identifying several factors that, if observed, would indicate PLAN incorporation of far seas defense as part of an emerging new maritime strategy. Visit the NDU Press Web site for more information on publications at ndupress.ndu.edu JFQ 79, 4 th Quarter 2015 Kern 95

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

AIR FORCE CYBER COMMAND STRATEGIC VISION

AIR FORCE CYBER COMMAND STRATEGIC VISION AIR FORCE CYBER COMMAND STRATEGIC VISION Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated

More information

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional

More information

The 19th edition of the Army s capstone operational doctrine

The 19th edition of the Army s capstone operational doctrine 1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:

More information

AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition November 2018 Cobo Center, Detroit, MI. Panel Topic Descriptions

AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition November 2018 Cobo Center, Detroit, MI. Panel Topic Descriptions AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition 28-29 November 2018 Cobo Center, Detroit, MI Panel Topic Descriptions Introduction: The AUSA A/AI symposium panel topics are framed

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

Cybersecurity United States National Security Strategy President Barack Obama

Cybersecurity United States National Security Strategy President Barack Obama Cybersecurity As the birthplace of the Internet, the United States has a special responsibility to lead a networked world. Prosperity and security increasingly depend on an open, interoperable, secure,

More information

Cyberspace Operations

Cyberspace Operations Joint Publication 3-12 R TMENT THI S W E' L L O F D E F E N D THE DEPA ARMY U NI TE D S TAT E S F O A AME RI C Cyberspace Operations 8 June 2018 PREFACE 1. Scope This publication provides joint doctrine

More information

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT OPERATIONAL ART PRIMER PROF. PATRICK C. SWEENEY 16 JULY 2010 INTENTIONALLY BLANK 1 The purpose of this primer is to provide the

More information

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings Preface US Cyber Command hosted its inaugural Cyberspace Strategy Symposium at National Defense University on February 15, 2018. This day-long

More information

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,

More information

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace 24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace Maj Gen Chris Wedge Weggeman Commander OVERALL CLASSIFICATION OF THIS BRIEFING IS Our Journey Today Cyber IN War A little bit about Air Forces

More information

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of Battlefield or IPB as it is more commonly known is a Command and staff tool that allows systematic, continuous

More information

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures Department of Defense DIRECTIVE NUMBER 3222.4 July 31, 1992 Incorporating Through Change 2, January 28, 1994 SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures USD(A)

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

THE 2008 VERSION of Field Manual (FM) 3-0 initiated a comprehensive

THE 2008 VERSION of Field Manual (FM) 3-0 initiated a comprehensive Change 1 to Field Manual 3-0 Lieutenant General Robert L. Caslen, Jr., U.S. Army We know how to fight today, and we are living the principles of mission command in Iraq and Afghanistan. Yet, these principles

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DISTINCTIVE FUNCTIONS OF THE UNITED STATES AIR FORCE IN THE CYBERSPACE DOMAIN

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DISTINCTIVE FUNCTIONS OF THE UNITED STATES AIR FORCE IN THE CYBERSPACE DOMAIN AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DISTINCTIVE FUNCTIONS OF THE UNITED STATES AIR FORCE IN THE CYBERSPACE DOMAIN By Andrew K. Hosler, Major, USAF A Research Report Submitted to the Faculty In

More information

A Call to the Future

A Call to the Future A Call to the Future The New Air Force Strategic Framework America s Airmen are amazing. Even after more than two decades of nonstop combat operations, they continue to rise to every challenge put before

More information

THE UNITED STATES NAVAL WAR COLLEGE

THE UNITED STATES NAVAL WAR COLLEGE NWC 1159 THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT A Guide for Deriving Operational Lessons Learned By Dr. Milan Vego, JMO Faculty 2006 A GUIDE FOR DERIVING OPERATIONAL LESSONS

More information

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century September How an Expeditionary Force Operates in the 21st Century Key Points Our ability to execute the Marine Corps Operating Concept in the future operating environment will require a force that has:

More information

Space as a War-fighting Domain

Space as a War-fighting Domain Space as a War-fighting Domain Lt Gen David D. T. Thompson, USAF Col Gregory J. Gagnon, USAF Maj Christopher W. McLeod, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY Chapter 13 Air and Missile Defense This chapter addresses air and missile defense support at the operational level of war. It includes a brief look at the air threat to CSS complexes and addresses CSS

More information

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in 1 This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in the JCIDS process is CJCSI 3010.02, entitled Joint Operations

More information

America s Airmen are amazing. Even after more than two decades of nonstop. A Call to the Future. The New Air Force Strategic Framework

America s Airmen are amazing. Even after more than two decades of nonstop. A Call to the Future. The New Air Force Strategic Framework A Call to the Future The New Air Force Strategic Framework Gen Mark A. Welsh III, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those of the authors and should not be

More information

The current Army operating concept is to Win in a complex

The current Army operating concept is to Win in a complex Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

How Can the Army Improve Rapid-Reaction Capability?

How Can the Army Improve Rapid-Reaction Capability? Chapter Six How Can the Army Improve Rapid-Reaction Capability? IN CHAPTER TWO WE SHOWED THAT CURRENT LIGHT FORCES have inadequate firepower, mobility, and protection for many missions, particularly for

More information

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword Foreword The global spread of sophisticated information technology is changing the speed at which warfare is conducted. Through the early adoption of high-tech data links, worldwide communication networks,

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

ADP337 PROTECTI AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY

ADP337 PROTECTI AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY ADP337 PROTECTI ON AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

Information Operations in Support of Special Operations

Information Operations in Support of Special Operations Information Operations in Support of Special Operations Lieutenant Colonel Bradley Bloom, U.S. Army Informations Operations Officer, Special Operations Command Joint Forces Command, MacDill Air Force Base,

More information

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects Power Projection through Cyberspace Capt Jason M. Gargan, USAF Disclaimer: The views and opinions expressed or

More information

Joint Information Environment. White Paper. 22 January 2013

Joint Information Environment. White Paper. 22 January 2013 White Paper "To fight and conquer in all bottles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance without fighting." -Sun Tzu "Some people think design means how

More information

Cyber Operations in the Canadian Armed Forces. Master Warrant Officer Alex Arndt. Canadian Forces Network Operations Centre

Cyber Operations in the Canadian Armed Forces. Master Warrant Officer Alex Arndt. Canadian Forces Network Operations Centre Cyber Operations in the Canadian Armed Forces Master Warrant Officer Alex Arndt Canadian Forces Network Operations Centre Chief Canadian of Force Armed Development Forces / Chef / Forces du Développement

More information

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS: Keynote by Dr. Thomas A. Kennedy Chairman and CEO of Raytheon Association of Old Crows Symposium Marriott Marquis Hotel Washington, D.C. 12.2.15 AS DELIVERED GOOD MORNING THANK YOU, GENERAL ISRAEL FOR

More information

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040:, Development, Test & Evaluation, Army / BA 2: Applied COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY

More information

Air-Sea Battle: Concept and Implementation

Air-Sea Battle: Concept and Implementation Headquarters U.S. Air Force Air-Sea Battle: Concept and Implementation Maj Gen Holmes Assistant Deputy Chief of Staff for Operations, Plans and Requirements AF/A3/5 16 Oct 12 1 Guidance 28 July 09 GDF

More information

Army Operating Concept

Army Operating Concept Army Operating Concept American Military Power is Joint Power The Army both depends on and supports air and naval forces across the land, air, maritime, space and cyberspace domains. As of: 14 NOV 2014

More information

... from the air, land, and sea and in every clime and place!

... from the air, land, and sea and in every clime and place! Department of the Navy Headquarters United States Marine Corps Washington, D.C. 20380-1775 3 November 2000 Marine Corps Strategy 21 is our axis of advance into the 21st century and focuses our efforts

More information

Su S rface Force Strategy Return to Sea Control

Su S rface Force Strategy Return to Sea Control S Surface urface F orce SReturn trategy to Sea Control Surface Force Strategy Return to Sea Control Preface WWII SHIPS GO HERE We are entering a new age of Seapower. A quarter-century of global maritime

More information

To date, space has been a fairly unchallenged environment to work in. The

To date, space has been a fairly unchallenged environment to work in. The Developing Tomorrow s Space War Fighter The Argument for Contracting Out Satellite Operations Maj Sean C. Temple, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those of

More information

CLASSES/REFERENCES TERMINAL LEARNING OBJECTIVE

CLASSES/REFERENCES TERMINAL LEARNING OBJECTIVE CLASSES/REFERENCES TERMINAL LEARNING OBJECTIVE Day 1: Operational Terms ADRP 1-02 Operational Graphics ADRP 1-02 Day2: Movement Formations &Techniques FM 3-21.8, ADRP 3-90 Offensive Operations FM 3-21.10,

More information

The pace of change and level of effort has increased dramatically with

The pace of change and level of effort has increased dramatically with Space & Cyberspace: The Overlap and Intersection of Two Frontiers By Jac W. Shipp Key Areas of Intersection Space, like cyberspace, is a warfighting domain. Both domains are information-centric and informationenabled.

More information

UNCLASSIFIED. Unclassified

UNCLASSIFIED. Unclassified Clinton Administration 1993 - National security space activities shall contribute to US national security by: - supporting right of self-defense of US, allies and friends - deterring, warning, and defending

More information

Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations

Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations Lieutenant Colonel Jeffrey B. Hukill, USAF-Ret. The effective command and control (C2) of cyberspace operations, as

More information

Air Force intelligence, surveillance, and reconnaissance (ISR)

Air Force intelligence, surveillance, and reconnaissance (ISR) Airmen Delivering Decision Advantage Lt Gen Larry D. James, USAF Air Force intelligence, surveillance, and reconnaissance (ISR) provides global vigilance our hedge against strategic uncertainty and risk

More information

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD CDR Cameron Chen CWMD Action Officer Deputy Director for Global Operations J-3 Operations Directorate 1 2 Agenda Review of DoD CWMD Strategy WMD Challenge,

More information

Chapter FM 3-19

Chapter FM 3-19 Chapter 5 N B C R e c o n i n t h e C o m b a t A r e a During combat operations, NBC recon units operate throughout the framework of the battlefield. In the forward combat area, NBC recon elements are

More information

Air-Sea Battle & Technology Development

Air-Sea Battle & Technology Development Headquarters U.S. Air Force Air-Sea Battle & Technology Development Col Gantt AF/A5XS 20 Mar 12 1 Agenda Background & Scope Definitions ASB Concept Overview ASB Central Idea: Networked, Integrated, Attack-in-Depth

More information

Global Vigilance, Global Reach, Global Power for America

Global Vigilance, Global Reach, Global Power for America Global Vigilance, Global Reach, Global Power for America The World s Greatest Air Force Powered by Airmen, Fueled by Innovation Gen Mark A. Welsh III, USAF The Air Force has been certainly among the most

More information

HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A

HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A HUMAN RESOURCES ADVANCED / SENIOR LEADERS COURSE 42A FACILITATED ARTICLE #25 Doctrine at the Speed of War A 21 st Century Paradigm For Army Knowledge January 2013 From Army Magazine, March 2012. Copyright

More information

Cyberspace Operations

Cyberspace Operations UNCLASSIFIED Cyberspace Operations Prepared for the 18th International Command and Control Research and Technology Symposium Major General Brett T. Williams Director of Operations (J3), USCYBERCOM The

More information

Go Tactical to Succeed By Capt. Ryan Stephenson

Go Tactical to Succeed By Capt. Ryan Stephenson Go Tactical to Succeed By Capt. Ryan Stephenson For Your Consideration Operating in contested environments requires special land and space systems. Proposed: An Army tactical space program for multi-domain

More information

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3100.4 PLI MARINE CORPS ORDER 3100.4 From: To: Subj: Commandant of the Marine Corps

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 OPNAVINST 3900.30 N4 OPNAV INSTRUCTION 3900.30 From: Chief of Naval Operations Subj: NAVY CAPABILITY

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

Joint Concept for Access and Maneuver in the Global Commons. A New Joint Operational Concept

Joint Concept for Access and Maneuver in the Global Commons. A New Joint Operational Concept Soldiers conduct static line airdrop during Joint Operational Access Exercise 13-02, at Sicily drop zone, Fort Bragg, North Carolina, to train with paratroopers from U.S. Army s 82 nd Airborne Division

More information

J. L. Jones General, U.S. Marine Corps Commandant of the Marine Corps

J. L. Jones General, U.S. Marine Corps Commandant of the Marine Corps Department of the Navy Headquarters United States Marine Corps Washington, D.C. 20380-1775 3 November 2000 Marine Corps Strategy 21 is our axis of advance into the 21st century and focuses our efforts

More information

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

UNCLASSIFIED. FY 2017 Base FY 2017 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2017 Office of the Secretary Of Defense Date: February 2016 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward

17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward 17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward Mr. Paul D. Mann (Acting) Principal Deputy Director Test Resource Management Center January 26, 2017 1 2 TRMC

More information

Chapter 1. Introduction

Chapter 1. Introduction MCWP -. (CD) 0 0 0 0 Chapter Introduction The Marine-Air Ground Task Force (MAGTF) is the Marine Corps principle organization for the conduct of all missions across the range of military operations. MAGTFs

More information

Airspace Control in the Combat Zone

Airspace Control in the Combat Zone Airspace Control in the Combat Zone Air Force Doctrine Document 2-1.7 4 June 1998 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE DOCTRINE DOCUMENT 2 1.7 4 JUNE 1998 OPR: HQ AFDC/DR (Maj Chris Larson,

More information

Searching for Digital Hilltops. A Doctrinal Approach to Identifying Key Terrain in Cyberspace

Searching for Digital Hilltops. A Doctrinal Approach to Identifying Key Terrain in Cyberspace U.S. Air Force B-52 Stratofortress, B-1 Lancer, and B-2 Spirit launch from Andersen Air Force Base, Guam, for integrated bomber operation, August 2016 (U.S. Air Force/Richard P. Ebensberger) Searching

More information

Tactical Technology Office

Tactical Technology Office Tactical Technology Office Dr. Bradford Tousley, Director DARPA Tactical Technology Office Briefing prepared for NDIA s 2017 Ground Robotics Capabilities Conference & Exhibition March 22, 2017 1 Breakthrough

More information

To be prepared for war is one of the most effectual means of preserving peace.

To be prepared for war is one of the most effectual means of preserving peace. The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are

More information

STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE

STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE FOR OFFICIAL USE ONLY UNTIL RELEASED BY THE SENATE ARMED SERVICES COMMITTEE STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE EMERGING

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533

More information

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces Navy Information Warfare Pavilion 19 February 2016 1030 RADM Matthew Kohler, Naval Information Forces It s All About Warfighting 2 IDC Reserve Command July 2012 Information Dominance Forces TYCOM October

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Assessing the State of the Joint IO Enterprise. Mr. Gregory Radabaugh, SES Director Joint Information Operations Warfare Center

Assessing the State of the Joint IO Enterprise. Mr. Gregory Radabaugh, SES Director Joint Information Operations Warfare Center Assessing the State of the Joint IO Enterprise Mr. Gregory Radabaugh, SES Director Joint Information Operations Warfare Center Agenda Current State of US Joint IO Enterprise Future Trends Affecting the

More information

ALLIED JOINT PUBLICATION FOR OPERATIONS PLANNING (AJP 5) AS NEW CHALLENGES FOR MILITARY PLANNERS

ALLIED JOINT PUBLICATION FOR OPERATIONS PLANNING (AJP 5) AS NEW CHALLENGES FOR MILITARY PLANNERS ALLIED JOINT PUBLICATION FOR OPERATIONS PLANNING (AJP 5) AS NEW CHALLENGES FOR MILITARY PLANNERS Ján Spišák Abstract: The successful planning of military operations requires clearly understood and widely

More information

Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations

Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations February 2008 Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations One of the principal challenges the Army faces is to regain its traditional edge at fighting conventional wars while retaining

More information

Information Operations

Information Operations Information Operations Air Force Doctrine Document 2 5 5 August 1998 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE DOCTRINE DOCUMENT 2 5 5 AUGUST 1998 OPR: HQ AFDC/DR (Maj Stephen L. Meyer, USAF)

More information

The Role of Exercises in Training the Nation's Cyber First-Responders

The Role of Exercises in Training the Nation's Cyber First-Responders Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of Exercises in Training the Nation's

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED JFHQ DODIN Update The overall classification of this briefing is: Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 1 Presentation Disclaimer "The information provided in this briefing is for general

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

Enemy-Oriented Tactical Tasks. Exploit Feint Fix Interdict Neutralize. Terrain-Oriented Tactical Tasks. Retain Secure

Enemy-Oriented Tactical Tasks. Exploit Feint Fix Interdict Neutralize. Terrain-Oriented Tactical Tasks. Retain Secure Terms and Graphics References FM 101-5-1 Operational Terms and Graphics is the key reference for operations orders. JP 1-02 DoD Dictionary and MCRP 5-12C Marine Corps Supplement to the DoD Dictionary are

More information

Reconsidering the Relevancy of Air Power German Air Force Development

Reconsidering the Relevancy of Air Power German Air Force Development Abstract In a dynamically changing and complex security political environment it is necessary to constantly reconsider the relevancy of air power. In these days of change, it is essential to look far ahead

More information

INTRODUCTION. Chapter One

INTRODUCTION. Chapter One Chapter One INTRODUCTION Traditional measures of effectiveness (MOEs) usually ignore the effects of information and decisionmaking on combat outcomes. In the past, command, control, communications, computers,

More information

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations By Major Robert A. Piccerillo, USAF And David A. Brumbaugh Major Robert A.

More information

1. What is the purpose of common operational terms?

1. What is the purpose of common operational terms? Army Doctrine Publication 1-02 Operational Terms and Military Symbols 1. What is the purpose of common operational terms? a. Communicate a great deal of information with a simple word or phrase. b. Eliminate

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: The Defense Warning Network References: See Enclosure 1 NUMBER 3115.16 December 5, 2013 Incorporating Change 1, Effective April 18, 2018 USD(I) 1. PURPOSE. This

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3000.07 December 1, 2008 USD(P) SUBJECT: Irregular Warfare (IW) References: (a) DoD Directive 5100.1, Functions of the Department of Defense and Its Major Components,

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Army DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information

RETROGRADE OPERATIONS

RETROGRADE OPERATIONS CHAPTER 11 RETROGRADE OPERATIONS A retrograde operation is a maneuver to the rear or away from the enemy. It is part of a larger scheme of maneuver to regain the initiative and defeat the enemy. Its propose

More information

GLOSSARY - M Last Updated: 6 November 2015 ABBREVIATIONS

GLOSSARY - M Last Updated: 6 November 2015 ABBREVIATIONS AIR FORCE GLOSSARY GLOSSARY - M Last Updated: 6 November 2015 ABBREVIATIONS MAAP MAC MACCS MAF MAGTF MAJCOM MARLE MARLO MASF MASINT MEDEVAC MHE MHS MIJI MILSATCOM MISO MISREPS MISTF MiTT MIW MOA MOB MOE

More information

CSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP

CSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP CSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP Learn advanced skills needed for practical and dynamic cyber operations (cyber warfare) strategy and planning and certify as a CSFI Cyberspace

More information

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST THE QUANTITATIVE DIFFERENCES OF TODAY S AIR CAMPAIGNS IN CONTEXT AND THE IMPACT OF COMPETING PRIORITIES JUNE 2016 Operations to degrade, defeat, and destroy

More information

Expeditionary Force 21 Attributes

Expeditionary Force 21 Attributes Expeditionary Force 21 Attributes Expeditionary Force In Readiness - 1/3 of operating forces deployed forward for deterrence and proximity to crises - Self-sustaining under austere conditions Middleweight

More information

CHIEF OF AIR FORCE COMMANDER S INTENT. Our Air Force Potent, Competent, Effective and Essential

CHIEF OF AIR FORCE COMMANDER S INTENT. Our Air Force Potent, Competent, Effective and Essential CHIEF OF AIR FORCE COMMANDER S INTENT Our Air Force Potent, Competent, Effective and Essential Air Marshal Leo Davies, AO, CSC 4 July 2015 COMMANDER S INTENT Air Marshal Leo Davies, AO, CSC I am both

More information

Public Affairs Operations

Public Affairs Operations * FM 46-1 Field Manual FM 46-1 Headquarters Department of the Army Washington, DC, 30 May 1997 Public Affairs Operations Contents PREFACE................................... 5 INTRODUCTION.............................

More information

New DoD Approaches on the Cyber Survivability of Weapon Systems

New DoD Approaches on the Cyber Survivability of Weapon Systems New DoD Approaches on the Cyber Survivability of Weapon Systems Colonel Dean Data Clothier Chief, Cyberspace Division Joint Staff/J-6 CSE is the Critical Foundation for Ensuring Cyber Survivability is

More information

Research Proposal Major William Torn Tompkins ISR RTF Vigilant Horizons. Working Title

Research Proposal Major William Torn Tompkins ISR RTF Vigilant Horizons. Working Title Working Title Multi-Domain Command and Control of ISR: Ensuring support to Unit Level Intelligence DISCLAIMER The views expressed in this academic research paper are those of the author and do not reflect

More information

Joint Communications System

Joint Communications System Joint Publication 6-0 R TMENT THI S W E' L L O F D E F E N D THE DEPA ARMY U NI TE D S TAT E S F O A AME RI C Joint Communications System 10 June 2015 This publication is the keystone document for communications

More information

Capability Solutions for Joint, Multinational, and Coalition Operations

Capability Solutions for Joint, Multinational, and Coalition Operations USS Ashland patrols waters off coast of Australia during biennial U.S.-Australia bilateral Exercise Talisman Saber 17, Coral Sea, July 21, 2017 (U.S. Navy/Jonathan Clay) Born Multinational Capability Solutions

More information